Fedora 41 Update: scap-security-guide-0.1.75-1.fc41

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-56456406e2
2024-12-12 01:33:19.386749+00:00
--------------------------------------------------------------------------------

Name        : scap-security-guide
Product     : Fedora 41
Version     : 0.1.75
Release     : 1.fc41
URL         : https://github.com/ComplianceAsCode/content/
Summary     : Security guidance and baselines in SCAP formats
Description :
The scap-security-guide project provides a guide for configuration of the
system from the final system's security point of view. The guidance is specified
in the Security Content Automation Protocol (SCAP) format and constitutes
a catalog of practical hardening advice, linked to government requirements
where applicable. The project bridges the gap between generalized policy
requirements and specific implementation guidelines. The system
administrator can use the oscap CLI tool from openscap-scanner package, or the
scap-workbench GUI tool from scap-workbench package to verify that the system
conforms to provided guideline. Refer to scap-security-guide(8) manual page for
further information.

--------------------------------------------------------------------------------
Update Information:

Important Highlights
Add new product kylinserver10 (#12393)
Create OL10 product (#12290)
Update PCI-DSS control file for version 4.0.1 (#12435)
New Rules and Profiles
[New Rule] Package kea removed (#12464)
Add Ism profile for ol8 (#12493)
Add Ism profile to OL9 (#12346)
Create CIS rules for login banners (#12472)
New rule tftp_uses_secure_mode_systemd (#12436)
Update chrony rules for RHEL 10 (#12415)
Update RHEL 9 STIG to V2R2 (#12551)
Changes in Remediations
Add ansible remediation configure_bind_crypto_policy  (#12325)
Add ansible remediation to ensure_oracle_gpgkey_installed rule (#12323)
Add ansible remediation to mount_option_home template  (#12546)
Add ansible remediaton for rsyslog_cron_logging rule  (#12326)
Add insensitive option to ansible_lineinfile macro (#12314)
Add rule accounts_tmout to SLE Micro 5 STIG profile (#12524)
Add rule security_patches_up_to_date to SLE Micro 5 STIG profile (#12506)
Add rules to support remote offload of journal logs (#12479)
Add support for XCCDF variables into sshd_lineinfile template (#12251)
Added remediation and tests for the rule permissions_local_var_log_audit
(#12360)
Avoid tmpfiles override (#12218)
Bring bash version in-sync with Ansible (#12398)
Change flags cleanup (#12397)
Create CIS rules for login banners (#12472)
Don't autoremove packages on dnf package uninstall (#12389)
Fix "unknown predicate -L" (#12305)
Fix ansible remediation for audispd plugin UBTU-20-010216 (#12293)
Skip users with ID above UID MAX on
accounts_user_interactive_home_directory_defined (#12527)
SLE15 related fixes in ntp and aide rules (#12548)
Slmicro5 stig add accounts and software rules support (#12364)
Update ansible remediation to harden_sshd_ciphers_openssh_conf_crypto_policy
rule  (#12324)
Update bash remediation to fix bug into account_disable_inactivity*  (#12134)
Update remedation for firewalld_sshd_port_enabled (#12522)
Update select rules for RHEL not to modify systemd units in /usr (#12486)
Update SLE12 STIG version to V3R1 (#12580)
Update SLE15 STIG version to V2R2 (#12570)
Changes in Checks
Add "is_substring" variable to grub2_bootloader_argument template (#12308)
Add OL9 into installed_OS_is_vendor_supported  (#12333)
Add rule accounts_tmout to SLE Micro 5 STIG profile (#12524)
Add support for XCCDF variables into sshd_lineinfile template (#12251)
convert more rules to sshd_lineinfile template (#12301)
Create CIS rules for login banners (#12472)
enhance the grub2_argument template to cover more use cases (#12375)
Fix Audit related rules in RHEL 10 (#12359)
Fix inventory_test_kernel_installed for SLE (#12516)
Remove redundant sshd oval macro (#12532)
Slmicro5 stig add accounts and software rules support (#12364)
Update SLE15 STIG version to V2R2 (#12570)
Removed Products
Remove uos20 (#12248)
Fixed Bugs
Remove installed_OS_is_FIPS_certified from sshd_use_approved_ciphers (#12242)
firewalld_sshd_port_enabled add zone to all connections (#12256)
Create CIS rules for login banners (#12472)
Disable sysctl_kernel_modules_disabled Ansible remediation (#12514)
Explicitly state FindOpenSCAP cmake so it loads before it's used. (#12538)
Extend mount_option_nodev_nonroot_local_partitions (#12270)
Fix crypto policy selection rhel10 (#12466)
Fix references section in the workshop artificial rule data. (#12261)
Fix title of var_networkmanager_dns_mode (#12258)
Remove enable_dracut_fips_module from RHEL 10 profiles (#12467)
Two CIS RHEL 9 enhancements (#12453)
Update Account Home Folder Rules (#12465)
Update audit_rules_suid_privilege_function to use ExecStart instead of
ExecStartPost (#12549)
Update Regex for sudoers_explicit_command_args (#12350)
Update SLE15 STIG version to V2R1 (#12269)
--------------------------------------------------------------------------------
ChangeLog:

* Thu Nov 14 2024 Matthew Burket <mburket@xxxxxxxxxx> - 0.1.75-1
- Update to latest upstream release
  https://github.com/ComplianceAsCode/content/releases/tag/v0.1.75
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2303894 - scap-security-guide-0.1.75 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=2303894
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-56456406e2' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux